Being Cyber Secure is important but so is….

being in Control of your business….

and being in control means that you have the right business information at your finger tips displayed in a simple and meaningful way…

That might mean that it is integrated into your Business Information applications. Part of an overall Business Information dashboard.

To get the information you need to ..

Detect ..

the presence of all devices that are using your networks. Not just PC’s, laptops, ipads and mobiles but ALL IoT devices … alarms, cctv, voice activated devices,manufacturing controls etc etc

Company issued devices and Bring your own Device ( BYOD ) .. those network using devices that staff and visitors bring into your business premises.

It is nearly always a surprise to our clients how many devices are actually in use in their premises.

When you have detected them you have VISIBILITY of the hardware aspect and then you need to

Monitor ..

Who and what and where and when and why are these devices talking to ?

On your premises or off your premises ?

What is the typical pattern of communications ?

( A useful facility built into LuJam is that of monitoring your Internet Connection – when is it up or down ?? )

We establish ” normal behaviour ” and we are increasingly able to detect and highlight abnormal behaviour ( eg the salesperson that hates using the CRM application but is suddenly on it for 48 hours straight … is he leaving ? )

We also find that people are using applications and visiting websites that they shouldn’t be. ( Bad websites are simply black listed and blocked – but can be white listed )

Now you have VISIBILITY of how devices and applications are being used on your network and a

Digital Asset Register..

and you have an understanding of communications and applications usage patterns

NOW you are really getting in control !!

Now COMPLIANCE with the policies and directives that you issued as a Director of the Business with Fiduciary Duties in an effort to comply with eg GDPR Regulations – can be verified.

( N.B. Typically a companies board has to think about many aspects with regard to cybersecurity:

Regulation: Are regulatory requirements being met?

Fiduciary duty: Is the company acting appropriately with regard to cybersecurity for our stakeholders ( customers and shareholders ) ?

Company liability: How does a failure to perform effectively in cybersecurity affect overall business performance?

Personal liability: If I am the CISO and we underperform in cybersecurity, might that affect my position? )

Now your Cyber Insurer can assess the

RISK

in your business.

Your Cyber Security responsible person or company can easily help you get certified to Government standards ( Cyber Essentials, CE Plus, ISO 27001 ) but this will not just be an annual assessment it is a 365,24-7 compliance with those standards.

With a

Risk Assessment and Cyber Essentials certification your Cyber Insurer will balance Risk against Premium and be inclined to reward you for your efforts.

So you are cyber secure, you are in control, you are compliant, your policies are actually being adhered to you saved the business money on cyber insurance and GDPR risks and we like to say..

Peace of Mind has arrived.

N.B. We develop LuJam Cyber guided by GCHQ, NCSC, IASME and our partners and clients. If there is something you would like to see us doing please let us know.

If you would like an online demonstration of the LuJam Cyber solution please contact chris@lujam.com or call +44 (0)117 373 6186 and ask for Chris ref. online demo.

Pin It on Pinterest